What is Git?

Git was created by Linus Torvalds in 2005 for development of the Linux kernel. The Linux kernel is an open-source monolithic Unix-link computer operating system kernel. So anyone can contribute to…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




The Accidental Panama Papers

Panama broker accidentally exposed 52,000 financial and legal documents of wealthy individuals

The so-called Panama Papers exposed 2.6 TB of information that threatened the reputations and privacy of many of the world’s richest and most powerful figures. If you thought this kind of incident would teach people to be more careful with their sensitive data, you’d be wrong. Very wrong.

This information exposed by the Panama Papers was the handiwork of hackers. Although cyber criminals continue to steal, sell and dump data every day, incredibly, an increasing amount of personal and corporate information is left exposed simply by accident.

Accidents All Too Common

With more of our activities moving online, the growing use of mobile devices, cloud applications and complexity of enterprise IT infrastructure, accidental data exposure is all too common. While large, sophisticated multi-nationals invest millions in cyber security, many third parties with sensitive information often do not have the teams or technology to stay ahead of fast evolving threats.

Unlike the original Panama Papers where data was hacked and exfiltrated, we detected a server that was accidentally exposing 52,000 documents including Know Your Customer applications, bank statements, wire transfers, company formation documents and scans of passports. None of this information is part of the original Panama Papers leak.

Unlike the Panama Papers which were provided to journalists, these documents could already be in the hands of criminals who could use them to blackmail, hold ransom or initiate other crimes.

Here are some examples of what we found:

· Dozens of “Know Your Customer” applications that describe financial assets and references for BHI Swiss Private Banking, UBS and Arifa.

Bank Statement
Example of a company formation notary document
Exposed Passports

Today’s attackers are focused, better armed and more organized. An underground economy exists to outsource attacks, reduce costs and allow more people with lower technical skills to launch more powerful attacks. In addition, with more of our data scattered across more servers, applications and companies, all it takes is one open window or one weak link.

Any device left open, using known TCP or UDP sharing ports, will be scanned by different threat actors several times a week. The number of hours that information is left exposed will magnify the amount of times data gets captured and disseminated — then used, sold and traded in the underground markets.

Individuals and organizations must take more responsibility for managing this risk and preventing theft. Data breaches covered by stiffer compliance regulations and breach notification laws are not just cutting short CEO careers, they are costing companies millions.

Companies must monitor for exposure — not only the network perimeter, but also the cloud, IT shadow and third parties, across the deep and dark web — so when it does happen, they can be alerted and respond faster, before more damage is done.

Previous generations recognized Panama as the place where man overcame great obstacles to trade and transport. What will today’s and future generations learn from what happened in Panama last year? Sadly, so far, apparently not much.

Add a comment

Related posts:

Median Income vs. GDP

A friend asked me to do this comparison between income and gross domestic product (GDP) per capita. He wondered about the seemingly conflicting claims that GDP is increasing while incomes are…

Guide to Busybox Compilation on Automotive Build Platforms

Busybox is an GPL2 software project that combines tiny versions of many common UNIX utilities into a single small executable. It has been around since the early 90’s, and it’s used in a vast variety…

How Future Cosmic Collisions Could Spark Alien Life

The origin of life has fascinated humanity for thousands of years. Science fiction has had an absolute field day depicting various ideas regarding our origin. A wide array of beliefs from pure…